Start by reading and following these instructions:
Create your Assignment submission and be sure to cite your sources, use APA style as required, check your spelling.
Research (Weeks 2-3)In order to better understand the problem that you wish to investigate for your capstone topic, you will need to conduct a review of the research literature. Your project should include a review of the existing research on your topic and a discussion comparing this research to your project focus. The review should address what others have discovered or written about your topic and how the research helps you with investigating your capstone project.
Module 2 Assignment
Literature Review- Part 1: Annotated Bibliography
Due Week 2
For this step of your capstone project, you will need to complete an annotated bibliography related to your APPROVED TOPIC: CYBER SECURITY. Please refer to this link to learn more about the purpose and contents of the annotated bibliography: OWL at Purdue
Be sure to complete all three components of the annotated bibliography (summarize, assess, reflect). Your initial annotated bibliography should include 12-15 sources/references and should follow the APA writing style. References should be no older than five years, but classic texts that outline well-established theories may be included in three of the sources.
For those familiar with Excel, an Excel template is provided. You can use this template while researching each reference or use a text-based format as shown at the OWL at Purdue weblink (above). Filling in a template as you research saves time when trying to find a specific reference during the writing phase.
Expert Solution Preview
As a medical professor responsible for creating assignments for medical college students, I understand the importance of conducting research and staying updated with the latest developments in the field. The assignment provided focuses on conducting a literature review as part of a capstone project on the topic of cyber security. In this assignment, students are required to create an annotated bibliography, summarizing, assessing, and reflecting on 12-15 relevant sources related to cyber security.
The purpose of the annotated bibliography is to gather a collection of credible and relevant sources that will provide a foundation for the capstone project on cyber security. Students should ensure that their sources are no older than five years, while allowing for the inclusion of classic texts that outline well-established theories in three of the sources.
When summarizing the sources, students should provide a concise overview of the main points, methods, and findings of each study or paper. It is important to include enough detail to demonstrate a thorough understanding of the source, but also to be concise.
In the assessment component, students should critically evaluate the sources by discussing the strengths and limitations of each study, the credibility of the authors and their methodology, and the relevance of the findings to the capstone project focus. This evaluation should help identify any gaps or limitations in the existing research related to cyber security.
Lastly, students should reflect on how each source contributes to their investigation of the capstone project. This should include a discussion of how the information obtained from the sources informs the research question, objectives, and methodology of the capstone project.
Overall, the annotated bibliography should demonstrate a comprehensive exploration of the existing research on cyber security, highlighting the key findings, weaknesses, and implications for the capstone project. APA writing style should be followed for citations and references to ensure accuracy and credibility.